You can deploy Synergis™ IX to manage both access control points and intrusion points in Security Center by following a sequence of steps.
|Step||Task||Where to find more information|
|Understand prerequisites and key issues before deploying|
|1||Learn about Synergis™ IX.|
|2||Before deploying Synergis™ IX in your system, read the release notes to learn about the new features, known issues, and limitations.|
|3||Ensure that your system software components are compatible with each other.|
|Prepare Security Center for Synergis™ IX deployment|
|4||Verify that your Security Center
license has the required option and certificate for deploying Synergis™ IX.
Go to the Config Tool home page, click , and confirm that Synergis™ IX is supported.
|5||Create a model of the facilities protected by Security Center. You can do the following:
|Installing the Synergis™ IX Web Enabled DIN Rail Controller|
|6||Install, or stage the installation of the Synergis™ IX hardware: controllers, expander
modules, keypads, readers, and so on. Be sure to collect the following information:
|Configure the Synergis™ IX controller through Synergis™ IX Portal|
|7||Configure the network settings for your Synergis™ IX controllers.|
|8||Configure the modules and readers connected to your Synergis™ IX controllers.|
|9||Configure the areas and inputs monitored by your Synergis™ IX controllers.|
|Configure the Synergis™ Cloud Link appliance through Synergis™ Appliance Portal|
|10||Prepare and configure the appliance, also called or .|
|11||Connect your Synergis™ IX controllers to the Synergis™ Cloud Link appliance.|
|Configure Security Center for access control and intrusion detection|
|12||Create the cardholders, credentials, and, optionally, badge templates.
NOTE: Cardholder groups, cardholders, and credentials must be created in Security Center. You can create them manually, or import them from a CSV file or from an Active Directory.
|13||Create the schedules and the access rules for access control and intrusion detection.|
|14||Configure the role created by
NOTE: If you use keypads that can display cardholder names and you want the names to be displayed, enable the Include identifiable personal data in synchronization option.
|15||Create the role.
NOTE: Unlike Access Manager roles, Intrusion Manager roles are not created by default.
|16||Enroll the Synergis™ unit in Security Center.|
|17||Configure the Synergis™ IX settings for cardholders and cardholder groups.|
|18||Create the doors to the areas that you want to monitor and control, and configure the Synergis™ IX settings for these doors.|
|19||Configure the secured
NOTE: Not all Security Center access control features are supported with the Synergis™ IX integration.
|20||Configure the Synergis™ IX settings for
NOTE: Intrusion detection areas are imported from controllers through the Synergis™ Cloud Link appliance.
|21||Test your system using the various investigation and diagnostic tools available in Security Center and Synergis™ IX Portal.|